IoT Security, Architectures and Concepts

"All architecture is design, but not all design is architecture." (Grady Booch)

Requirements engineering is one of the daily project life topics which are discussed extremely diverse. In project management training sessions and during studies, requirements engineering and management are served to the participants as a must have and “there is no way” around topics. As soon a...

Continue reading...

White labeling, rebranding, and partnerships with OEMs are in IoT business very common just like in any other domain too. But there are also unique aspects of IoT security or in general cyber security which are not available in other domains but extremely important. The importance here is caused by...

Continue reading...

Is there a perfect IoT security architecture outside? I’m pretty sure there isn’t. And I’m not alone in this opinion. Also, the European Union Agency For Network and Information Security (ENISA) did an analysis on this topic and found at least 8 different architecture, you can have a closer lo...

Continue reading...

Profound publications about IoT security are rare on the market even rarer are analysis details about threats, attacks, asset, etc. The "Baseline Security Recommendations for IoT" publication from the European Union of Agency and Information Security (ENISA) combine all this topics in one clearly st...

Continue reading...

Not really sure whether the reason is good or not but the cyber security topic is booming again since approx. 8 years. Eight years is also the timespan where IoT devices becoming more and more present in real use cases and being exposed to the real curiosity of hackers, white hats, or even just engi...

Continue reading...